Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
192s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe
Resource
win10v2004-20221111-en
General
-
Target
e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe
-
Size
225KB
-
MD5
1f7967917ae0b3ceccc0d63e2f249200
-
SHA1
e470fb1cf95badc7322b33a069993dc7e2be7185
-
SHA256
e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7
-
SHA512
d7df85daf9c68c62e17ee4065b1fcf27673f43502ed770a730c8f1328ea0a62577d5f1210db6ff9c5558c5750cce6ed59169fe1f0c41734b0db7ba07b9952955
-
SSDEEP
3072:+Oq9Zyvu1mFNPXmlRroxqT9S2c7gcPOLm28rZzAYoDPHYmFcAti2D:Iu4mFh+9S2c7xomHdNIY8cA02
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1628 RUNDLL32.EXE -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4092 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2d6c60610fb651f9e704c57a6bbdb40b.exe RUNDLL32.EXE File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2d6c60610fb651f9e704c57a6bbdb40b.exe RUNDLL32.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d6c60610fb651f9e704c57a6bbdb40b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RUNDLL32.EXE\" .." RUNDLL32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2d6c60610fb651f9e704c57a6bbdb40b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RUNDLL32.EXE\" .." RUNDLL32.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE 1628 RUNDLL32.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1628 3632 e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe 82 PID 3632 wrote to memory of 1628 3632 e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe 82 PID 3632 wrote to memory of 1628 3632 e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe 82 PID 1628 wrote to memory of 4092 1628 RUNDLL32.EXE 83 PID 1628 wrote to memory of 4092 1628 RUNDLL32.EXE 83 PID 1628 wrote to memory of 4092 1628 RUNDLL32.EXE 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe"C:\Users\Admin\AppData\Local\Temp\e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\RUNDLL32.EXE"C:\Users\Admin\AppData\Local\Temp\RUNDLL32.EXE"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\RUNDLL32.EXE" "RUNDLL32.EXE" ENABLE3⤵
- Modifies Windows Firewall
PID:4092
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD51f7967917ae0b3ceccc0d63e2f249200
SHA1e470fb1cf95badc7322b33a069993dc7e2be7185
SHA256e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7
SHA512d7df85daf9c68c62e17ee4065b1fcf27673f43502ed770a730c8f1328ea0a62577d5f1210db6ff9c5558c5750cce6ed59169fe1f0c41734b0db7ba07b9952955
-
Filesize
225KB
MD51f7967917ae0b3ceccc0d63e2f249200
SHA1e470fb1cf95badc7322b33a069993dc7e2be7185
SHA256e5bc458157486d1e0a7586644cbbb94587b95c29baabb3cddbc8ca2ce17eb1a7
SHA512d7df85daf9c68c62e17ee4065b1fcf27673f43502ed770a730c8f1328ea0a62577d5f1210db6ff9c5558c5750cce6ed59169fe1f0c41734b0db7ba07b9952955
-
Filesize
514B
MD5762b627d707999874d1f5f88bd46dc05
SHA18ba1defe0e2c3468254604d0455221cfe9d34a51
SHA2568b1e8df37059ab5d3400defc7308fd948ec6eb086499527f0a3bd5968a23ec15
SHA51281e5a506fdd923dc418aed0e1b778da8029d51d3b7cab975de81238efac5a9f73461ebe6712b219c52bcb72bea5483f1b9be74352f606a9559d7eb1d4440f1bf
-
Filesize
514B
MD5762b627d707999874d1f5f88bd46dc05
SHA18ba1defe0e2c3468254604d0455221cfe9d34a51
SHA2568b1e8df37059ab5d3400defc7308fd948ec6eb086499527f0a3bd5968a23ec15
SHA51281e5a506fdd923dc418aed0e1b778da8029d51d3b7cab975de81238efac5a9f73461ebe6712b219c52bcb72bea5483f1b9be74352f606a9559d7eb1d4440f1bf